CVE-2023-35086
📋 TL;DR
A format string vulnerability in ASUS RT-AX56U V2 and RT-AC86U routers allows remote attackers with administrator privileges to execute arbitrary code or disrupt services. The vulnerability occurs when user input is directly passed to syslog without proper sanitization in the httpd service. This affects specific firmware versions of these router models.
💻 Affected Systems
- ASUS RT-AX56U V2
- ASUS RT-AC86U
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote attacker gains full control of the router, can modify configurations, intercept traffic, install persistent malware, or use the device as a pivot point into the internal network.
Likely Case
Attacker executes arbitrary code to disrupt router services, modify DNS settings, or steal credentials from connected devices.
If Mitigated
With proper access controls and network segmentation, impact is limited to the router itself without lateral movement into the broader network.
🎯 Exploit Status
Exploitation requires administrator credentials. Format string vulnerabilities typically allow memory corruption leading to code execution.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check ASUS security advisory for latest patched versions
Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-7240-a5f96-1.html
Restart Required: Yes
Instructions:
1. Log into router web interface. 2. Navigate to Administration > Firmware Upgrade. 3. Check for updates. 4. If update available, download and install. 5. Router will reboot automatically.
🔧 Temporary Workarounds
Disable remote administration
allPrevents external attackers from accessing the web interface
In web interface: Advanced Settings > Administration > System > Enable Web Access from WAN: No
Change default credentials
allUse strong, unique administrator password
In web interface: Advanced Settings > Administration > System > Change router login password
🧯 If You Can't Patch
- Segment router on isolated network segment
- Implement strict firewall rules limiting access to router management interface
🔍 How to Verify
Check if Vulnerable:
Check firmware version in router web interface: Advanced Settings > Administration > Firmware Upgrade
Check Version:
ssh admin@router_ip 'nvram get buildno' or check web interface
Verify Fix Applied:
Verify firmware version is newer than affected versions listed in advisory
📡 Detection & Monitoring
Log Indicators:
- Unusual syslog format string patterns
- Multiple failed login attempts followed by successful login
Network Indicators:
- Unusual outbound connections from router
- Traffic to unexpected destinations
SIEM Query:
source="router_syslog" AND (message="*%n*" OR message="*%s*" OR message="*%x*")